Modify security test to avoid spacing differences.
authorcommit-queue@webkit.org <commit-queue@webkit.org@268f45cc-cd09-0410-ab3c-d52691b4dbfc>
Thu, 8 Jun 2017 17:01:50 +0000 (17:01 +0000)
committercommit-queue@webkit.org <commit-queue@webkit.org@268f45cc-cd09-0410-ab3c-d52691b4dbfc>
Thu, 8 Jun 2017 17:01:50 +0000 (17:01 +0000)
https://bugs.webkit.org/show_bug.cgi?id=141709

Patch by Marcos Chavarría Teijeiro <chavarria1991@gmail.com> on 2017-06-08
Reviewed by Carlos Alberto Lopez Perez.

* http/tests/security/XFrameOptions/x-frame-options-deny-multiple-clients-expected.txt:
* http/tests/security/XFrameOptions/x-frame-options-deny-multiple-clients.html:
* http/tests/security/cross-frame-access-callback-explicit-domain-ALLOW-expected.txt:
* http/tests/security/cross-frame-access-callback-explicit-domain-ALLOW.html:
* platform/gtk/TestExpectations:

git-svn-id: https://svn.webkit.org/repository/webkit/trunk@217931 268f45cc-cd09-0410-ab3c-d52691b4dbfc

LayoutTests/ChangeLog
LayoutTests/http/tests/security/XFrameOptions/x-frame-options-deny-multiple-clients-expected.txt
LayoutTests/http/tests/security/XFrameOptions/x-frame-options-deny-multiple-clients.html
LayoutTests/http/tests/security/cross-frame-access-callback-explicit-domain-ALLOW-expected.txt
LayoutTests/http/tests/security/cross-frame-access-callback-explicit-domain-ALLOW.html
LayoutTests/platform/gtk/TestExpectations

index 9ad6983..c004384 100644 (file)
@@ -1,3 +1,16 @@
+2017-06-08  Marcos Chavarría Teijeiro  <chavarria1991@gmail.com>
+
+        Modify security test to avoid spacing differences.
+        https://bugs.webkit.org/show_bug.cgi?id=141709
+
+        Reviewed by Carlos Alberto Lopez Perez.
+
+        * http/tests/security/XFrameOptions/x-frame-options-deny-multiple-clients-expected.txt:
+        * http/tests/security/XFrameOptions/x-frame-options-deny-multiple-clients.html:
+        * http/tests/security/cross-frame-access-callback-explicit-domain-ALLOW-expected.txt:
+        * http/tests/security/cross-frame-access-callback-explicit-domain-ALLOW.html:
+        * platform/gtk/TestExpectations:
+
 2017-06-08  Youenn Fablet  <youenn@apple.com>
 
         getUserMedia request should not be allowed for background tabs unless the tab is already capturing
index 7dfd597..48b9e0c 100644 (file)
@@ -2,4 +2,6 @@ CONSOLE MESSAGE: Refused to display 'http://127.0.0.1:8000/security/XFrameOption
 ALERT: PASS: onload fired.
 CONSOLE MESSAGE: Refused to display 'http://127.0.0.1:8000/security/XFrameOptions/resources/x-frame-options-deny.cgi' in a frame because it set 'X-Frame-Options' to 'deny'.
 ALERT: PASS: onload fired.
-Test that two main resources pointing to the same url that are canceled within didReceiveResponse() don't cause us to crash.   
+Test that two main resources pointing to the same url that are canceled within didReceiveResponse() don't cause us to crash.
+
index 05be6d7..6252d3b 100644 (file)
@@ -6,8 +6,7 @@ if (window.testRunner)
 </script>
 </head>
 <body>
-Test that two main resources pointing to the same url that are canceled within didReceiveResponse() don't cause us to crash.
-
+<p>Test that two main resources pointing to the same url that are canceled within didReceiveResponse() don't cause us to crash.</p>
 <iframe src="http://127.0.0.1:8000/security/XFrameOptions/resources/x-frame-options-deny.cgi" onload="alert('PASS: onload fired.');"></iframe>
 <iframe src="http://127.0.0.1:8000/security/XFrameOptions/resources/x-frame-options-deny.cgi" onload="alert('PASS: onload fired.');"></iframe>
 </body>
index 3f9666e..2a0fae6 100644 (file)
@@ -1,4 +1,5 @@
-The child frame will get a function from the parent frame, set the document.domain property and then try to use the function. The function should still be able to access parent frame properties. 
+The child frame will get a function from the parent frame, set the document.domain property and then try to use the function. The function should still be able to access parent frame properties.
+
 
 PASS: canGet('window.location.href') should be 'true' and is.
 PASS: window.thisIsTopFrame should be 'true' and is.
index 2a6fb49..e09df87 100644 (file)
@@ -3,8 +3,7 @@
     <script src="resources/cross-frame-access.js"></script>
 </head>
 <body>
-<p>The child frame will get a function from the parent frame, set the document.domain property 
-and then try to use the function. The function should still be able to access parent frame properties.
+<p>The child frame will get a function from the parent frame, set the document.domain property and then try to use the function. The function should still be able to access parent frame properties.</p>
 <script>
 if (window.testRunner)
     testRunner.dumpAsText();
index d55b0f6..40e8435 100644 (file)
@@ -994,8 +994,6 @@ webkit.org/b/141700 fast/dom/Element/getClientRects.html [ Failure ]
 webkit.org/b/141700 fast/dom/Range/getClientRects.html [ Failure ]
 
 webkit.org/b/141705 media/video-fullscreeen-only-controls.html [ Failure ]
-webkit.org/b/141709 http/tests/security/XFrameOptions/x-frame-options-deny-multiple-clients.html [ Failure ]
-webkit.org/b/141709 http/tests/security/cross-frame-access-callback-explicit-domain-ALLOW.html [ Failure ]
 
 webkit.org/b/141831 svg/animations/animate-text-nested-transforms.html [ Failure ]
 webkit.org/b/98653  svg/text/lengthAdjust-text-metrics.html [ Failure ]